Home

Description

Lightning Flow Scanner provides a A CLI plugin, VS Code Extension and GitHub Action for analysis and optimization of Salesforce Flows. Versions 6.10.5 and below allow a maliciously crafted flow metadata file to cause arbitrary JavaScript execution during scanning. The APIVersion rule uses new Function() to evaluate expression strings, enabling an attacker to supply a malicious expression within rule configuration or crafted flow metadata. This could compromise developer machines, CI runners, or editor environments. This issue is fixed in version 6.10.6.

PUBLISHED Reserved 2025-12-11 | Published 2025-12-12 | Updated 2025-12-12 | Assigner GitHub_M




HIGH: 8.4CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 6.10.6
affected

References

github.com/...canner/security/advisories/GHSA-55jh-84jv-8mx8

github.com/...ommit/10f64a5eb193d8a777e453b25e910144e4540795

github.com/...ghtning-flow-scanner/releases/tag/core-v6.10.6

cve.org (CVE-2025-67750)

nvd.nist.gov (CVE-2025-67750)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.